Tldr: City that outgrew its water supply recommends moving to a place with more water.
Although you wouldn't really get that from reading the article, which seems more about blaming people for Tehrans rapid growth and weather conditions.
Tldr: City that outgrew its water supply recommends moving to a place with more water.
Although you wouldn't really get that from reading the article, which seems more about blaming people for Tehrans rapid growth and weather conditions.
Dead Comment
Because I suspect "warning this person isnt an idiot" doesnt turn out to be the warning they expect.
Firstly, on the counter argument side, when you visit a website, you are using their hardware, they have every right to make any requirements they want to use their hardware, they are not public spaces.
But more importantly, the fix is actually easy, use more than one browser, use private browsing sessions, use more than one device, only log in to services you dont mind tracking you, use ad blocking. everywhere. Dont use sites that dont behave. All things you should be doing anyway.
However, I also think the whole concept of browser fingerprinting is exaggerated. None of the things that can be used for fingerprinting are long lived, meaning any fingerprint probably has a shorter life span than the average cookie, and also far less reliable than say an IP address, which absolutely doesnt personally identify you.
meanwhile, it is quite rediculous to log in to all these services with 2FA, then expect any kind of technical or legal measure to prevent them from knowing exactly who you are with 100% accuracy.
Mostly thinking out loud, truly anonymous browsing is a tor node away, but a long time since I used that, there wasn't anything there I was interested in after intel exchange went down.
Anthropic made a load of ubsubstantiated accusations about a new problem they dont specify.
Then at the end Anthropic proposed the solution to this unspecified problem is to give anthropic money.
Completely agree that is promotional material masquerading as a threat report of no material value.
Who exactly should and can control the horde of OSS developers?
Thanks for letting know though!
https://www.mvp.express/docs/v0.1.0/examples/kvstore
Under examples